Leann, A fresh set of Power9 patches for the kernel.
Michael On 03/09/2017 11:29 AM, Launchpad Bug Tracker wrote: > bugproxy (bugproxy) has assigned this bug to you for Ubuntu: > > Dear Canonical, > > Currently Ubuntu is having some issues on a POWER9 machine, as: > > > [ 443.933079] ------------[ cut here ]------------ > [ 443.933102] WARNING: CPU: 10 PID: 10243 at > /build/linux-iMfvOW/linux-4.10.0/arch/powerpc/mm/fault.c:428 > do_page_fault+0x5d8/0x7d0 > [ 443.933105] Modules linked in: vmx_crypto ofpart cmdlinepart > ipmi_powernv powernv_flash ipmi_devintf mtd uio_pdrv_genirq ipmi_msghandler > ibmpowernv opal_prd uio ib_iser rdma_cm iw_cm ib_cm ib_core configfs > iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables > autofs4 ses enclosure scsi_transport_sas btrfs raid10 raid456 > async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq > libcrc32c raid1 raid0 multipath linear ast i2c_algo_bit ttm drm_kms_helper > syscopyarea sysfillrect sysimgblt fb_sys_fops crc32c_vpmsum drm i40e aacraid > [ 443.933206] CPU: 10 PID: 10243 Comm: apt-get Not tainted > 4.10.0-9-generic #11-Ubuntu > [ 443.933211] task: c0000007adbc2c00 task.stack: c0000007adc60000 > [ 443.933214] NIP: c0000000000519d8 LR: c0000000000515b4 CTR: > 0000000000000003 > [ 443.933217] REGS: c0000007adc63b00 TRAP: 0700 Not tainted > (4.10.0-9-generic) > [ 443.933219] MSR: 9000000000029033 <SF,HV,EE,ME,IR,DR,RI,LE> > [ 443.933237] CR: 48248422 XER: 00000000 > [ 443.933240] CFAR: c00000000005163c SOFTE: 1 > GPR00: c0000000000515b4 c0000007adc63d80 c00000000142c400 > c0000007ad0a3b60 > GPR04: 00003fff7b7bc92c 0000000000000000 00000007fc020000 > 0000000000000000 > GPR08: 0000000000000003 0000000000000001 c0000000012ec400 > 0000000000000000 > GPR12: 0000000000004000 c00000000fb85a00 0000000000000001 > 00003fff7d640ea8 > GPR16: 00003fffdc1b6e78 00003fffdc1b6e70 00003fffdc1b6e68 > 00003fffdc1b6e58 > GPR20: 00003fff7d640e00 ffffffffffffffc0 0000000000030001 > 0000000000000000 > GPR24: 0000000000000054 c0000007b21e0b68 c0000007ad0a3b60 > c0000007b21e0b00 > GPR28: 00003fff7b7bc92c 0000000008000000 0000000000000000 > c0000007adc63ea0 > [ 443.933307] NIP [c0000000000519d8] do_page_fault+0x5d8/0x7d0 > [ 443.933312] LR [c0000000000515b4] do_page_fault+0x1b4/0x7d0 > [ 443.933314] Call Trace: > [ 443.933320] [c0000007adc63d80] [c0000000000515b4] > do_page_fault+0x1b4/0x7d0 (unreliable) > [ 443.933328] [c0000007adc63e30] [c00000000000a4e8] > handle_page_fault+0x10/0x30 > [ 443.933332] Instruction dump: > [ 443.933337] 60000000 60420000 71280007 4182fe1c 77a90800 4182fc94 > 3d42ffec 892ab491 > [ 443.933351] 2f890000 409efc84 39200001 992ab491 <0fe00000> 4bfffc74 > 7f86e378 7ec5b378 > [ 443.933366] ---[ end trace 4798790ae3dab875 ]--- > > > ====== > > > We would like to include the following patches to fix it: > > * cee216a696b2004017a5ecb583366093d90b1568 mm/autonuma: don't use > set_pte_at when updating protnone ptes > > * 288bc54949fc2625a4fd811a188fb200cc498946 mm/autonuma: let architecture > override how the write bit should be stashed in a protnone pte. > > * 595cd8f256d24face93b2722927ec9c980419c26 mm/ksm: handle protnone saved > writes when making page write protect > > * c137a2757b88658ce61c74b25ff650ecda7f09d8 switch ppc64 to its own > implementation of saved write > > * db08f2030a173fdb95b2e8e28d82c4e8c04df2ac mm/gup: check for protnone > only if it is a PTE entry > > * 9a8b300f2f7812ebf4630b8b40499da38b38e882 mm/thp/autonuma: use TNF flag > instead of vm fault > > > * power/mm: update pte_write and pte_wrprotect to handle savedwrite: > http://ozlabs.org/~akpm/mmots/broken-out/power-mm-update-pte_write-and-pte_wrprotect-to-handle-savedwrite.patch > > * powerpc/mm: Handle protnone ptes on fork: > http://ozlabs.org/~akpm/mmots/broken-out/powerpc-mm-handle-protnone- > ptes-on-fork.patch > > > Thanks > > ** Affects: ubuntu > Importance: Undecided > Assignee: Taco Screen team (taco-screen-team) > Status: New > > > ** Tags: architecture-ppc64le bugnameltc-152432 severity-high > targetmilestone-inin1604 -- Michael Hohnbaum OIL Program Manager Power (ppc64el) Development Project Manager Canonical, Ltd. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1671613 Title: POWER9: Additional power9 patches Status in linux package in Ubuntu: In Progress Status in linux source package in Zesty: In Progress Bug description: Dear Canonical, Currently Ubuntu is having some issues on a POWER9 machine, as: [ 443.933079] ------------[ cut here ]------------ [ 443.933102] WARNING: CPU: 10 PID: 10243 at /build/linux-iMfvOW/linux-4.10.0/arch/powerpc/mm/fault.c:428 do_page_fault+0x5d8/0x7d0 [ 443.933105] Modules linked in: vmx_crypto ofpart cmdlinepart ipmi_powernv powernv_flash ipmi_devintf mtd uio_pdrv_genirq ipmi_msghandler ibmpowernv opal_prd uio ib_iser rdma_cm iw_cm ib_cm ib_core configfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 ses enclosure scsi_transport_sas btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ast i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops crc32c_vpmsum drm i40e aacraid [ 443.933206] CPU: 10 PID: 10243 Comm: apt-get Not tainted 4.10.0-9-generic #11-Ubuntu [ 443.933211] task: c0000007adbc2c00 task.stack: c0000007adc60000 [ 443.933214] NIP: c0000000000519d8 LR: c0000000000515b4 CTR: 0000000000000003 [ 443.933217] REGS: c0000007adc63b00 TRAP: 0700 Not tainted (4.10.0-9-generic) [ 443.933219] MSR: 9000000000029033 <SF,HV,EE,ME,IR,DR,RI,LE> [ 443.933237] CR: 48248422 XER: 00000000 [ 443.933240] CFAR: c00000000005163c SOFTE: 1 GPR00: c0000000000515b4 c0000007adc63d80 c00000000142c400 c0000007ad0a3b60 GPR04: 00003fff7b7bc92c 0000000000000000 00000007fc020000 0000000000000000 GPR08: 0000000000000003 0000000000000001 c0000000012ec400 0000000000000000 GPR12: 0000000000004000 c00000000fb85a00 0000000000000001 00003fff7d640ea8 GPR16: 00003fffdc1b6e78 00003fffdc1b6e70 00003fffdc1b6e68 00003fffdc1b6e58 GPR20: 00003fff7d640e00 ffffffffffffffc0 0000000000030001 0000000000000000 GPR24: 0000000000000054 c0000007b21e0b68 c0000007ad0a3b60 c0000007b21e0b00 GPR28: 00003fff7b7bc92c 0000000008000000 0000000000000000 c0000007adc63ea0 [ 443.933307] NIP [c0000000000519d8] do_page_fault+0x5d8/0x7d0 [ 443.933312] LR [c0000000000515b4] do_page_fault+0x1b4/0x7d0 [ 443.933314] Call Trace: [ 443.933320] [c0000007adc63d80] [c0000000000515b4] do_page_fault+0x1b4/0x7d0 (unreliable) [ 443.933328] [c0000007adc63e30] [c00000000000a4e8] handle_page_fault+0x10/0x30 [ 443.933332] Instruction dump: [ 443.933337] 60000000 60420000 71280007 4182fe1c 77a90800 4182fc94 3d42ffec 892ab491 [ 443.933351] 2f890000 409efc84 39200001 992ab491 <0fe00000> 4bfffc74 7f86e378 7ec5b378 [ 443.933366] ---[ end trace 4798790ae3dab875 ]--- ====== We would like to include the following patches to fix it: * cee216a696b2004017a5ecb583366093d90b1568 mm/autonuma: don't use set_pte_at when updating protnone ptes * 288bc54949fc2625a4fd811a188fb200cc498946 mm/autonuma: let architecture override how the write bit should be stashed in a protnone pte. * 595cd8f256d24face93b2722927ec9c980419c26 mm/ksm: handle protnone saved writes when making page write protect * c137a2757b88658ce61c74b25ff650ecda7f09d8 switch ppc64 to its own implementation of saved write * db08f2030a173fdb95b2e8e28d82c4e8c04df2ac mm/gup: check for protnone only if it is a PTE entry * 9a8b300f2f7812ebf4630b8b40499da38b38e882 mm/thp/autonuma: use TNF flag instead of vm fault * power/mm: update pte_write and pte_wrprotect to handle savedwrite: http://ozlabs.org/~akpm/mmots/broken-out/power-mm-update-pte_write-and-pte_wrprotect-to-handle-savedwrite.patch * powerpc/mm: Handle protnone ptes on fork: http://ozlabs.org/~akpm/mmots/broken-out/powerpc-mm-handle-protnone- ptes-on-fork.patch Thanks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1671613/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp